Stop Data Loss and Insider Threats with a People-centric Approach to Security

Logo
Presented by

Jack Poller, ESG | Jeremy Wittkop, Proofpoint

About this talk

IT teams are under increasing pressure as the shift to remote work, an evolving cybersecurity landscape, and higher data volumes present new challenges that make their environments less secure. Making things even more complicated for IT professionals are the array of threats they are required to deal with, whether that be careless employees, attackers, or malicious insiders. IT professionals looking to mitigate and prevent these vulnerabilities are often hampered by limited resources and a hodgepodge of technologies, turning an already challenging job into a nearly impossible one. In Proofpoint’s ‘Stop Data Loss and Insider Threats with a People-Centric Approach to Security,’ we’ll explore how a people-centric approach to cybersecurity gives companies and IT teams the resources and strategies they need to stay ahead of the curve in the modern cybersecurity landscape. Join Jack Poller, Senior Analyst with ESG and Jeremy Wittkop, Principle Security Architect with Proofpoint, for a discussion on: Monitoring data handling by remote users and risky insiders Securing access by unmanaged devices Defending data against cloud account compromise Classifying your data at-scale to handle higher data volumes and augment DLP Augmenting security staff with the help of a managed services partner And more

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (736)
Subscribers (77413)
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.